CN109033888A - It is a kind of intelligence contract source code mechanism is disclosed - Google Patents
It is a kind of intelligence contract source code mechanism is disclosed Download PDFInfo
- Publication number
- CN109033888A CN109033888A CN201810847606.7A CN201810847606A CN109033888A CN 109033888 A CN109033888 A CN 109033888A CN 201810847606 A CN201810847606 A CN 201810847606A CN 109033888 A CN109033888 A CN 109033888A
- Authority
- CN
- China
- Prior art keywords
- source code
- block chain
- code
- intelligent contract
- binary code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 229910002056 binary alloy Inorganic materials 0.000 claims description 3
- 238000007689 inspection Methods 0.000 claims description 3
- 238000005516 engineering process Methods 0.000 description 8
- 238000000034 method Methods 0.000 description 5
- 238000012795 verification Methods 0.000 description 3
- 238000012423 maintenance Methods 0.000 description 2
- 241000208340 Araliaceae Species 0.000 description 1
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 description 1
- 235000003140 Panax quinquefolius Nutrition 0.000 description 1
- 230000004927 fusion Effects 0.000 description 1
- 235000008434 ginseng Nutrition 0.000 description 1
- 230000002787 reinforcement Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a kind of intelligent contract source codes to disclose mechanism, comprising the following steps: intelligent contract source code is generated binary code by compiling;The binary code of generation is published in block chain by block chain interface, forms the binary code on block chain;It is put into togerther on block chain when binary code is put into block chain, while intelligent contract source code;User downloads binary code and carries out verifying the services or functionalities that intelligent contract provides;Source code is put into block chain by compiling, is consulted and checked the source code of related service function on block referring to binary code.The present invention is issued by the binary code for generating source code and is verified on block chain for user; user is allowed really to understand source code mechanism; and protect a possibility that safety on block chain is with supervising behavior of the other users on block chain, user and developer fundamentally being prevented to practise fraud or alter program data.
Description
Technical field
The present invention relates to internet database technical fields more particularly to a kind of intelligent contract source code to disclose mechanism.
Background technique
Block chain technology, also known as distributed account book technology are that one kind goes center trustization, collective to safeguard distributed account book
Technical solution, essence is to realize data not by way of storing, calculating in many ways in many ways by multiple node group participations
It can distort, the believable distributed data base system of calculated result.Block chain is not a kind of single technology, but multiple technologies
Fusion as a result, account book that is reliable using block chain technical maintenance one, being difficult to tamper with records, the wind of trust can be reduced
Danger, and the maintenance cost of many participant cooperations can be effectively reduced.The development of block chain technology makes it possible intelligent contract,
Its essence is one section of code executed automatically by a computer or computer network according to the rights and duties of signature contract,
The execution of contract is controlled without central node.Since intelligent contract uses the mode of code, it ensure that contract terms
Enforce;Intelligent contract is combined with block chain, so that the clause of contract can just be usurped without third party once setting
Change.This subversive technology of intelligent contract is the key property of block chain, it will generates great change to human society structure.
Intelligent contract is a set of promise defined in digital form, and contract participant can execute these promises above
Agreement, itself and information relevant with contract of intelligent contract only have relevant contract that can contact just now, when what is clashed
When relevant information can be just exposed to third party examination.
In the prior art, the former technology in block chain causes intelligent contract cannot be by institute without disclosure on source code
There is the supervision of user, thus a possibility that causing user and developer to practise fraud or alter program data.
Summary of the invention
In order to solve the problems in the prior art, and a kind of intelligent contract source code proposed discloses mechanism to the present invention, purpose
It is that the binary code for generating source code is issued on block chain for user's verification, allows user really to understand source code mechanism, and altogether
With the behavior of safety and supervision other users on block chain on protection block chain.
To achieve the goals above, present invention employs following technical solutions:
It is a kind of intelligence contract source code mechanism is disclosed, it is characterised in that: the following steps are included:
(1), intelligent contract source code is generated into binary code by compiling;
(2), the binary code of generation is published in block chain by block chain interface, forms the binary system on block chain
Code;
(3), when binary code is put into block chain, while intelligent contract source code is put into togerther on block chain;
(4), user downloads binary code and carries out verifying the services or functionalities that intelligent contract provides;
(5), source code is put into block chain by compiling, is consulted referring to binary code and checks related clothes on block
The source code for function of being engaged in.
Preferably, in the step (1), need first to obtain the abi of intelligent contract corresponding to source code, and obtain intelligence
Source code is generated binary code by contract address.
Preferably, the binary code of the generation is meaningless binary code, the regular abi by intelligent contract of compiling
In data type limited, can be parsed out the actual content for including in binary code by abi.
Preferably, in the step (2), as check-node when user downloads binary code, which belongs to ginseng
With node, which can be recorded in block chain.
Preferably, after source code is compiled and is put into block chain in the step (4), constraint condition and rule can be generated, only
School inspection can be just downloaded using user by having.
Preferably, the binary code on the block chain and the source code after compiling, answer content consistent, are then true after verifying
Actual source code is not true source code if prompt is inconsistent, needs further to verify.
Compared with prior art, the present invention provides a kind of intelligent contract source codes to disclose mechanism, have it is following the utility model has the advantages that
The intelligence contract source code discloses mechanism, is issued by the binary code for generating source code and is verified on block chain for user, allowed
User really understands source code mechanism, and protects the behavior of safety and supervision other users on block chain on block chain, from root
A possibility that preventing user and developer to practise fraud or alter program data on this.
It is not directed to part in the device to be the same as those in the prior art or can be realized by using the prior art, structure of the invention
Simply, easy to operate.
Detailed description of the invention
Fig. 1 is that a kind of intelligent contract source code that the embodiment of the present invention 1 proposes discloses the flow chart of mechanism;
Fig. 2 is that a kind of intelligent contract source code that the embodiment of the present invention 2 proposes discloses generation binary code and the verification of mechanism
Flow chart
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.
Embodiment 1
As shown in Figure 1, a kind of intelligence contract source code discloses mechanism, comprising the following steps:
(1), intelligent contract source code is generated into binary code by compiling;
(2), the binary code of generation is published in block chain by block chain interface, forms the binary system on block chain
Code;
(3), when binary code is put into block chain, while intelligent contract source code is put into togerther on block chain;
(4), user downloads binary code and carries out verifying the services or functionalities that intelligent contract provides;
(5), source code is put into block chain by compiling, is consulted referring to binary code and checks related clothes on block
The source code for function of being engaged in.
Further, in the step (2), as check-node when user downloads binary code, which belongs to
Node is participated in, which can be recorded in block chain.
Further, after source code is compiled and is put into block chain in the step (4), constraint condition and rule can be generated,
School inspection only can be just downloaded using user.
Further, the binary code on the block chain and the source code after compiling, answer content consistent after verifying, then for
True source code is not true source code if prompt is inconsistent, needs further to verify.
Embodiment 2
As shown in Fig. 2, the detailed process for generating binary code is, source code is obtained, by compiling the corresponding intelligence obtained
The abi of energy contract, and intelligent contract address is obtained, source code is generated binary code, and the binary code of generation is published to area
In block chain, the binary code of generation is meaningless binary code, and compiling rule is by the data type in the abi of intelligent contract
It is limited, the binary code of generation is meaningless binary code, and compiling rule is by the data type in the abi of intelligent contract
It is limited, can be parsed out the actual content for including in binary code by abi, simultaneously, source code is put by compiling
In block chain, the process of verification is that user is reduced to the true interior of intelligent contract by downloading binary code, by binary code
Hold and regular, and verified with the source code in block chain, the authenticity of the intelligence contract can be verified out, make program developer
The original technology source code can be trusted from the beginning with user, and in addition program developer and user are downloading source code as node
When the source code software check source code of generation, by running a source code process, program developer and user can be allowed to understand
Game rule are without changing then and publication is real source code, while program developer and user be after having understood source code, can
To carry out reinforcement to the defence on oneself node, also make platform more safe and reliable.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto,
Anyone skilled in the art in the technical scope disclosed by the present invention, according to the technique and scheme of the present invention and its
Inventive concept is subject to equivalent substitution or change, should be covered by the protection scope of the present invention.
Claims (6)
1. a kind of intelligence contract source code discloses mechanism, it is characterised in that: the following steps are included:
(1), intelligent contract source code is generated into binary code by compiling;
(2), the binary code of generation is published in block chain by block chain interface, forms the binary code on block chain;
(3), when binary code is put into block chain, while intelligent contract source code is put into togerther on block chain;
(4), user downloads binary code and carries out verifying the services or functionalities that intelligent contract provides;
(5), source code is put into block chain by compiling, is consulted and checked related service function on block referring to binary code
The source code of energy.
2. a kind of intelligent contract source code according to claim 1 discloses mechanism, it is characterised in that: in the step (1), need
The abi of intelligent contract corresponding to source code first obtained, and obtain intelligent contract address, source code is generated into binary code.
3. a kind of intelligent contract source code according to claim 2 discloses mechanism, it is characterised in that: the binary system of the generation
Code is meaningless binary code, and compiling rule is limited by the data type in the abi of intelligent contract, can be with by abi
Parse the actual content for including in binary code.
4. a kind of intelligent contract source code according to claim 1 discloses mechanism, it is characterised in that: in the step (2), use
As check-node when binary code is downloaded at family, which belongs to participation node, which can be recorded in block
In chain.
5. a kind of intelligent contract source code according to claim 1 discloses mechanism, it is characterised in that: source in the step (4)
After code is compiled and is put into block chain, constraint condition and rule can be generated, school inspection only can be just downloaded using user.
6. a kind of intelligent contract source code according to claim 1 discloses mechanism, it is characterised in that: two on the block chain
Source code after ary codes and compiling, answers content consistent, is then true source code, be not true if prompt is inconsistent after verifying
Actual source code needs further to verify.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810847606.7A CN109033888A (en) | 2018-07-27 | 2018-07-27 | It is a kind of intelligence contract source code mechanism is disclosed |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810847606.7A CN109033888A (en) | 2018-07-27 | 2018-07-27 | It is a kind of intelligence contract source code mechanism is disclosed |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109033888A true CN109033888A (en) | 2018-12-18 |
Family
ID=64647316
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810847606.7A Pending CN109033888A (en) | 2018-07-27 | 2018-07-27 | It is a kind of intelligence contract source code mechanism is disclosed |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109033888A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109451061A (en) * | 2018-12-20 | 2019-03-08 | 全链通有限公司 | The contract of block chain adjusts processing method and system |
CN112948827A (en) * | 2021-01-11 | 2021-06-11 | 杭州复杂美科技有限公司 | Source code compiling verification method, system, equipment and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104866767A (en) * | 2015-05-11 | 2015-08-26 | 北京航空航天大学 | Embedded module of novel security mechanism |
CN106101242A (en) * | 2016-06-24 | 2016-11-09 | 深圳前海微众银行股份有限公司 | The construction method of block chain cloud service platform and device |
CN107038242A (en) * | 2017-04-24 | 2017-08-11 | 杭州趣链科技有限公司 | It is a kind of towards the global intelligent contract business datum analytic method of block chain |
CN107844704A (en) * | 2017-11-01 | 2018-03-27 | 济南浪潮高新科技投资发展有限公司 | One kind is based on block chain believable intelligent contract reinforcement means |
CN107943469A (en) * | 2017-11-17 | 2018-04-20 | 深圳圣马歌科技有限公司 | A kind of dissemination method and device of intelligence contract |
CN108304307A (en) * | 2018-01-24 | 2018-07-20 | 深圳圣马歌科技有限公司 | The method for testing performance of intelligent contract on a kind of block chain |
-
2018
- 2018-07-27 CN CN201810847606.7A patent/CN109033888A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104866767A (en) * | 2015-05-11 | 2015-08-26 | 北京航空航天大学 | Embedded module of novel security mechanism |
CN106101242A (en) * | 2016-06-24 | 2016-11-09 | 深圳前海微众银行股份有限公司 | The construction method of block chain cloud service platform and device |
CN107038242A (en) * | 2017-04-24 | 2017-08-11 | 杭州趣链科技有限公司 | It is a kind of towards the global intelligent contract business datum analytic method of block chain |
CN107844704A (en) * | 2017-11-01 | 2018-03-27 | 济南浪潮高新科技投资发展有限公司 | One kind is based on block chain believable intelligent contract reinforcement means |
CN107943469A (en) * | 2017-11-17 | 2018-04-20 | 深圳圣马歌科技有限公司 | A kind of dissemination method and device of intelligence contract |
CN108304307A (en) * | 2018-01-24 | 2018-07-20 | 深圳圣马歌科技有限公司 | The method for testing performance of intelligent contract on a kind of block chain |
Non-Patent Citations (1)
Title |
---|
DXD6789: "在etherscan.io网站校验智能合约源码", 《CSDN》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109451061A (en) * | 2018-12-20 | 2019-03-08 | 全链通有限公司 | The contract of block chain adjusts processing method and system |
CN109451061B (en) * | 2018-12-20 | 2021-06-01 | 全链通有限公司 | Contract adjustment processing method and system for block chain |
CN112948827A (en) * | 2021-01-11 | 2021-06-11 | 杭州复杂美科技有限公司 | Source code compiling verification method, system, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Huang et al. | Smart contract security: A software lifecycle perspective | |
Liu et al. | Hyperservice: Interoperability and programmability across heterogeneous blockchains | |
Lu et al. | NeuCheck: A more practical Ethereum smart contract security analysis tool | |
CN106326694A (en) | Android application reinforcing method baed on C source code mixing | |
CN110751485B (en) | Data processing method and equipment | |
WO2020035831A1 (en) | Transaction system and method of operation thereof | |
Ahrendt et al. | Smart contracts: a killer application for deductive source code verification | |
CN109033888A (en) | It is a kind of intelligence contract source code mechanism is disclosed | |
Avizheh et al. | Verifiable computation using smart contracts | |
Ameur-Boulifa et al. | Sysml model transformation for safety and security analysis | |
Jonathan et al. | Security issues and vulnerabilities on a blockchain system: A review | |
Dai et al. | Trustzone-based secure lightweight wallet for hyperledger fabric | |
Barboni et al. | SuMo: A mutation testing approach and tool for the Ethereum blockchain | |
Rubin et al. | Merkelized abstract syntax trees | |
Sundaram et al. | A Review: Customers Online Security on Usage of Banking Technologies in Smartphones and Computers. | |
Gallingani | Static detection and automatic exploitation of intent message vulnerabilities in Android applications | |
Yi et al. | Bitcoin, Ethereum, Smart Contracts and Blockchain Types | |
CN113282893A (en) | Source code reinforcing method and device, computer equipment and storage medium | |
Kiechl et al. | Extension and Standardization of a Blockchain Interoperability API | |
Yang et al. | CrossFuzz: Cross-contract fuzzing for smart contract vulnerability detection | |
Singh et al. | A review on the capability and smart contract potential of block chain technology | |
Ramakrishnan et al. | Solidity Vulnerability Scanner | |
Bielova et al. | Matching policies with security claims of mobile applications | |
Suresh | Foundations of security protocol analysis | |
Hossan et al. | A Comprehensive Analysis of Blockchain Technology and Consensus Protocols Across Multilayered Framework |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181218 |
|
RJ01 | Rejection of invention patent application after publication |